Answer:
Attackers can use ROP to execute code in the presence of DEP by chaining together existing code snippets (gadgets) that are part of executable memory, bypassing the non-executable stack.
Attackers can use ROP to execute code in the presence of DEP by chaining together existing code snippets (gadgets) that are part of executable memory, bypassing the non-executable stack.
You may be interested in:
Web Security MCQs